• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Information Technology Journal
  2. Vol 11 (7), 2012
  3. 741-750
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Information Technology Journal

Year: 2012 | Volume: 11 | Issue: 7 | Page No.: 741-750
DOI: 10.3923/itj.2012.741.750

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 104

Authors


Bo Meng

Country: China

Keywords


  • automatic verification
  • coercion-resistance
  • Computational model
  • observational equivalence
Research Article

Automatic Formal Framework of Coercion-resistance in Internet Voting Protocols with CryptoVerif in Computational Model

Bo Meng
Automatic proof for internet voting protocols is a hotspot issue in security protocol world. To our best knowledge, until now analysis of coercion-resistance and internet voting protocols with automatic tool in computational model does not exist. So in this study, we initiatively proposed the automatic framework of coercion-resistance and internet voting protocols based on computational model with active adversary. In the proposed framework observational equivalence is used to formalize coercion-resistance. At the same time we propose a method to prove the observational equivalence between the two processes have the same structure and differ only by the terms and term evaluations with mechanized tool CryptoVerif. Based on the proposed method to prove with CryptoVerif the observational equivalence, the proposed mechanized framework can be used to automatically analyze coercion-resistance of internet voting protocols with CryptoVerif.
PDF Fulltext XML References Citation

How to cite this article

Bo Meng, 2012. Automatic Formal Framework of Coercion-resistance in Internet Voting Protocols with CryptoVerif in Computational Model. Information Technology Journal, 11: 741-750.

DOI: 10.3923/itj.2012.741.750

URL: https://scialert.net/abstract/?doi=itj.2012.741.750

Related Articles

Security Mechanism in Computer Network Environment: A Study of Adoption Status in Malaysian Company
Modeling and Combining Access Control Policies Using Constrained Policy Graph (CPG)
Multi Touch Graphical Password: Usability Features
Formal Analysis of Key Properties in the Internet Voting Protocol Using Applied Pi Calculus
A Critical Review of Receipt-Freeness and Coercion-Resistance

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved